Cyber: Inside Caller-as-a-Service Fraud: The Scam Economy Has a Hiring Process - 2025 Update

Cyber: Inside Caller-as-a-Service Fraud: The Scam Economy Has a Hiring Process - 2025 Update

Fraudulent phone calls have become a daily reality for millions of people worldwide. From fake law enforcement officials to bank representatives and impersonated tech support agents, victims are increasingly targeted through direct, real-time conversations designed to create urgency accompanied by high psychological pressure to extract sensitive information or money theft. Reports show that this type of cybercrime significantly impacts society both financially and emotionally. According to the FBI, US elderly citizens (60+) lost $3.4B in 2023. Another report shows that vishing increased by 449% in 2025 and the average loss per scam call is $3,690. In this article, we shine a light on what can be described as “Caller-as-a-Service”, which is an under-explored yet rapidly evolving facet of modern cybercrime. We examine how, much like legitimate sales organizations, threat actors have adopted structured, business-like operating models, complete with specialization, scalability, and performance-driven execution. These ecosystems are no longer ad hoc. They are composed of distinct roles and functions, with different actors focusing on specific stages of the attack lifecycle: from infrastructure and tooling to social engineering execution. We explore how these networks operate, including their recruitment strategies, defined roles and responsibilities, and even tailored compensation models—all of which closely mirror legitimate market dynamics. The result is a highly organized, service-driven economy that professionalizes fraud at scale, lowering the barrier to entry while increasing both efficiency and impact. The scam call ecosystem has become highly professionalized and segmented, mirroring legitimate business operations. Distinct roles now exist across the value chain, including malware developers, distributors, phishing kit builders, infrastructure operators, log sellers, data analysts, victim list traders, and finally, scam callers who execute the attacks. Thi

Source: BleepingComputer